How to protect your computer from Thunderspy attack
Thunderbolt is a hardware brand interface developed by Intel that acts as an interface between computers and external devices. Many companies now use Thunderbolt to connect to a variety of devices, but according to research at Eindhoven University of Technology, the security behind Thunderbolt can be broken using a technique - Thunderspy.
This technique implements an attack by silently allowing an attacker to access the direct memory access (DMA) function to endanger devices. The danger of this attack is to leave no trace nor execute any malware. It can bypass the best security check and lock the victim's computer. So even if the computer has security features like Secure Boot, a strong BIOS and operating system account password and activates encryption of the entire hard disk, Thunderspy will still ignore everything.
Several ways to protect your computer from Thunderspy
1. Secured-core PC protections
Microsoft's Windows Security provides Windows Defender System Guard and virtualization-based security. However, you need a device that uses Secured-core PCs. This technology uses native hardware security in modern CPUs to boot the system into a trusted state. It helps to reduce the execution of malware attacks at the firmware level.
Therefore, you should not disable the system default Windows Security program to be able to maintain the protection.

Windows Defender System Guard feature of Windows Security
2. Kernel DMA protection
Introduced in Windows 10 version 1803, the Kernel DMA protection helps prevent foreign devices from Direct Memory Access (DMA) attacks with PCI plug-in devices like Thunderbolt.
That means that if someone tries to copy malicious Thunderbolt software to the machine, it will be blocked at the Thunderbolt port. However, this feature is not effective when hackers have Windows login account and password.
4.5 ★ | 2 Vote
You should read it
- Discovered a group of hackers who use secret code to spy on 21 countries
- Warning: Dangerous new malicious code spills over to Vietnam
- Watch out for new dangerous viruses similar to WannaCry
- 100 hackers were arrested for the super-dangerous BlackShades malicious code
- New weapons against malicious code are 'cloud' computing.
- Warning: New malicious code is infecting about 500,000 router devices
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
- Embed malicious code into PDF file without security error
May be interested
- Mandrake: Super sophisticated Android malicious code, only 4 years to be discoveredmandrake will carefully select the victim. it will only target the most valuable targets (possessing large amounts of valuable data).
- The new Microsoft 365 login pages are fakethe hackers' online fraud campaign has adapted and aims to use the newly updated design of azure ad and microsoft 365 login pages.
- More than 4,000 Android apps reveal user informationaccording to thehackernew, the entire android application uses google's firebase cloud service and it is unclear what causes the user's sensitive information to be exposed.
- How to use Emsisoft Decryptor to recover files encrypted by DJVU ransomwarefor all versions of stop djvu, the information can be decoded correctly, if they are encrypted using an offline key available to the developers of emsisoft decryptor.
- Warning about Ransomware Sqpc, belonging to STOP / Djvusqpc adds its special .sqpc extension to all files. for example, the video.avi file, will be modified to video.avi.sqpc. as soon as the encryption is successful, sqpc creates a special file _readme.txt, and adds it to all the directories containing the modified files.
- SaltStack has the most serious vulnerability ever, thousands of servers can be seriously affectedunlike previous vulnerabilities, this one of saltstack can affect all servers in the system, causing a much bigger impact.